Talk With an Expert

Defending with Graphs: Create a Graph Data Map to Visualize Pivot Paths

Defending with Graphs: Create a Graph Data Map to Visualize Pivot Paths (PDF, 4.10MB)Published: 26 Jun, 2019
Created by
Brianne Fahey

Preparations made during the Identify Function of the NIST Cybersecurity Framework can often pay dividends once an event response is warranted. Knowing what log data is available improves incident response readiness and providing a visual layout of those sources enables responders to pivot rapidly across relevant elements. Thinking in graphs is a multi-dimensional approach that improves upon defense that relies on one-dimensional lists and two-dimensional link analyses. This paper proposes a methodology to survey available data element relationships and apply a graph database schema to create a visual map. This graph data map can be used by analysts to query relationships and determine paths through the available data sources. A graph data map also allows for the consideration of log sources typically found in a SIEM alongside other data sources like an asset management database, application whitelist, or HR information which may be particularly useful for event context and to review potential Insider Threats. The templates and techniques described in this paper are available in GitHub for immediate use and further testing.

Defending with Graphs: Create a Graph Data Map to Visualize Pivot Paths